eddLeak: Enhancing Precision of Detecting Inter-app Data Leakage in Android Applications

被引:0
|
作者
Phan The Duy [1 ]
Van-Hau Pham [1 ]
Nguyen Tan Cam [2 ]
机构
[1] Vietnam Natl Univ, Univ Informat Technol, Informat Secur Lab, Ho Chi Minh City, Vietnam
[2] Hoa Sen Univ, Fac Sci & Technol, Ho Chi Minh City, Vietnam
关键词
android security analysis; inter-component communication; inter-application communication; sensitive information leakage; static analysis; inter-app leakage;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In recent years, mobile malware has grown to be significant types of behaviors, including stealing personal information of users, hijacking and surveilling user devices. Every year, it caused financial loss for infected enterprises, also more and more concerned about seriously secure data problems. Hence, many solutions have been proposed in order to detect malware leading to sensitive data leakage by analyzing mobile applications. Static analysis is a widely used technique for analyzing software, particularly in the security context, such as malware detection. Unfortunately, the static analysis technique often produces false alarms, which require significant manual effort to improve, such as DidFail tool. In this paper, we show how to analyze Android applications with static analysis to detect and identify which apps can be used to leak out sensitive information of users. We improve DidFail's architecture by implementing more modules and focus on the principles of Inter-Component Communication (ICC) between components in one or cross applications, then combining Android permission rules model to propose eddLeak approach, which enhance DidFail's precision of detecting inter-app leakage on Android applications and evaluate on customized application datasets.
引用
收藏
页码:674 / 679
页数:6
相关论文
共 50 条
  • [31] IAFDroid: Demystifying Collusion Attacks in Android Ecosystem via Precise Inter-App Analysis
    Wang, Bin
    Yang, Chao
    Ma, Jianfeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2883 - 2898
  • [32] Lifting inter-app data-flow analysis to large app sets
    Florian Sattler
    Alexander von Rhein
    Thorsten Berger
    Niklas Schalck Johansson
    Mikael Mark Hardø
    Sven Apel
    Automated Software Engineering, 2018, 25 : 315 - 346
  • [33] Roaming Through the Castle Tunnels: An Empirical Analysis of Inter-app Navigation of Android Apps
    Ma, Yun
    Hu, Ziniu
    Gu, Diandian
    Zhou, Li
    Mei, Qiaozhu
    Huang, Gang
    Liu, Xuanzhe
    ACM TRANSACTIONS ON THE WEB, 2020, 14 (03)
  • [34] Detecting GPS Information Leakage in Android Applications
    Ma, Siyuan
    Tang, Zhushou
    Xiao, Qiuyu
    Liu, Jiafa
    Tran Triet Duong
    Lin, Xiaodong
    Zhu, Haojin
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 826 - 831
  • [35] Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysis
    Ly Hoang Tuan
    Nguyen Tan Cam
    Van-Hau Pham
    Cluster Computing, 2019, 22 : 1079 - 1085
  • [36] Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysis
    Ly Hoang Tuan
    Nguyen Tan Cam
    Van-Hau Pham
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1079 - 1085
  • [37] Enhancing RansomwareElite App for Detection of Ransomware in Android Applications
    Shivangi
    Sharma, Gautam
    Johri, Anubhav
    Akshita
    Goel, Anurag
    Gupta, Anuradha
    2018 ELEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2018, : 300 - 303
  • [38] VDetector: Detecting vulnerability based on inter-component data flows in Android applications
    Huang, Kun
    Liu, Xuchong
    Wang, Weiping
    Wang, Haodong
    2019 15TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2019), 2019, : 321 - 326
  • [39] Borrowing Your Enemy's Arrows: The Case of Code Reuse in Android via Direct Inter-app Code Invocation
    Gao, Jun
    Li, Li
    Kong, Pingfan
    Bissyande, Tegawende F.
    Klein, Jacques
    PROCEEDINGS OF THE 28TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '20), 2020, : 939 - 951
  • [40] Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications
    Bosu, Amiangshu
    Liu, Fang
    Yao, Danfeng
    Wang, Gang
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 71 - 85